Upload
clarissa-howard
View
219
Download
0
Embed Size (px)
Citation preview
Educational Template
Chapter 11Data Privacy and Security
Ross Fraser
Chap
ter 1
1 D
ata
Priv
acy
& S
ecur
ity
Key Concepts
Chap
ter 1
1 –
Key
Conc
epts• Privacy , Security and Consent
• Health information custodian• Data steward• De-identification and
Pseudonymization• User enrolment and authentication• Audit
Learning Activity Type
Chap
ter 1
1 –
Lear
ning
Acti
vity
Typ
e
Assimilation & Reflection :
Exercise 1 = Assimilative - Getting started Exercise 2 = Productive - Informatics solution focusedExercise 3= Interactive/adaptive - Accelerated learning
Anticipated Value
Chap
ter 1
1 –
Antic
ipat
ed V
alue
A learning opportunity to develop a greater awareness of the issues raised in Chapter 11 on data privacy and security within the context of health care environment and its application to nursing. This learning offers some exercises to review the content in detail and apply the knowledge and principles presented to your clinical setting.
Exercise 1, 2 and 3 offers you an opportunity to assimilate the material and demonstrate how well you understand this important topic.
Assessment Exercises
Chap
ter 1
1– A
sses
smen
t Ex
erci
ses
Discuss this statement in regard to privacy of the person from a cultural perspective
The protection of personal health information is a right.
Exercise 1
Consider the topic of confidentiality in relation to the technical challenges involved in the maintenance and access of confidential information. List what you think are the key issues that must be addressed?
Exercise 2
Consent is presented within this chapter in a variety of various forms. Reflect upon the most frequently used type of consent that you have witnessed in your practice domain. Is there instances where the different approaches to consent presented in this chapter are evident in your practice domain? If not can you think of particular scenarios in which different types of consent for example deemed consent should be considered? Review the information security policy in your practice domain and assess the security principles within the document in accordance with ISO 27799 and the 11 topics listed in this chapter.
Exercise 3